Sciweavers

3426 search results - page 77 / 686
» Self-identifying sensor data
Sort
View
TSP
2010
14 years 4 months ago
Optimal/near-optimal dimensionality reduction for distributed estimation in homogeneous and certain inhomogeneous scenarios
We consider distributed estimation of a deterministic vector parameter from noisy sensor observations in a wireless sensor network (WSN). The observation noise is assumed uncorrela...
Jun Fang, Hongbin Li
GLOBECOM
2007
IEEE
15 years 4 months ago
A TDMA-based Scheduling and Routing Algorithm for Data-Centric Wireless Sensor Networks
—Recharging the batteries of a moribund sensor deployed as part of a wireless sensor network is often infeasible due to logistical considerations. With the purpose of prolonging ...
Yean-Fu Wen, Frank Yeong-Sung Lin, Hung-Shi Wang
WINET
2002
128views more  WINET 2002»
14 years 9 months ago
Negotiation-Based Protocols for Disseminating Information in Wireless Sensor Networks
In this paper, we present a family of adaptive protocols, called SPIN (Sensor Protocols for Information via Negotiation), that efficiently disseminate information among sensors in ...
Joanna Kulik, Wendi Rabiner Heinzelman, Hari Balak...
INFOCOM
2011
IEEE
14 years 1 months ago
Multiple task scheduling for low-duty-cycled wireless sensor networks
—For energy conservation, a wireless sensor network is usually designed to work in a low-duty-cycle mode, in which a sensor node keeps active for a small percentage of time durin...
Shuguang Xiong, Jianzhong Li, Mo Li, Jiliang Wang,...
IJSN
2006
76views more  IJSN 2006»
14 years 9 months ago
Elliptic curve cryptography-based access control in sensor networks
: Access control in sensor networks is used to authorise and grant users the right to access the network and data collected by sensors. Different users have different access right ...
Haodong Wang, Bo Sheng, Qun Li